
In the dynamic landscape of a digital world, gaming organizations, irrespective of their size, find themselves contending with a host of cybersecurity threats. Cybersecurity has evolved beyond being a mere trending term - it now serves as a crucial component for the longevity and success of any organization in today's world. Traditional thought often leans towards fortifying against external threats, viruses, and the like – primarily through measures such as anti-virus software, firewalls, and making sure systems are patched. This classic approach, while essential, may inadvertently overlook a significant and insidious risk that emanates from within the organization's own ranks - insider threats.
Insider threats represent a distinctive category of security risk that exists somewhat differently from conventional cybersecurity threats. They stem from individuals within the organization - those entrusted with access to sensitive data and assets such as gaming devices, cloud databases, and financials. Thus, rather than being visible threats that can be combated with conventional protective measures, insider threats lurk undetected, deeply embedded within the organization, creating a potential vulnerability at its very core.
While insider threats are often associated with human actions or behaviors, it's important to acknowledge that there are other types that do not involve human intervention directly or that are even intentional. These still can manifest in the form of compromised internal systems and processes such as improper disposal or recycling of company hardware, third-party software flaws, shadow IT (the practice of users bringing their own devices without following policy), social engineering (Phishing emails, unauthorized personnel), transmitting confidential data to AI large language models such as ChatGPT, patrons abusing the games and the list goes on.
Penetration Testing (Pen Testing) is a crucial cybersecurity practice where ethical hackers identify system vulnerabilities to preempt malicious attacks. However, despite its importance, it's often under-utilized due to factors like limited resources and lack of awareness. Beyond Pen Testing, less discussed but equally critical issues like social engineering and internal fraud also pose significant threats in the cybersecurity landscape. We call this the internal threat because it involves your employees who are on the inside.

The Ponemon Institute, a research center dedicated to privacy, data protection, and information security policy, released a report for 2022 on insider threats for corporations.
Social engineering is a crafty manipulation technique where tricksters exploit human psychology to gain access to sensitive data, systems, or even your property such as a cash cage. When we talk about insider threats, social engineering can be particularly dangerous, especially when employees are untrained and unaware of such tactics. It can make seemingly harmless interactions - like emails, phone calls, or even casual conversations - potential gateways to an organization's valuable and confidential information.
Phishing and vishing are two common forms of social engineering. Phishing typically involves deceptive emails appearing to be from a reputable source, designed to trick employees into revealing personal information, such as passwords or financial information. Vishing, on the other hand, is the voice-call equivalent of phishing, where scammers attempt to dupe people over the phone into providing sensitive information. Both phishing and vishing rely on creating a sense of urgency or exploiting trust to manipulate people into breaking normal security procedures. In one case I have seen a former employee conduct complex vishing attacks utilizing multiple people and loopholes with how money is processed at the casino.

Social engineering can also involve physical deception, which includes trespassing or impersonation to gain unauthorized access to restricted areas. For example, I have posed as a maintenance worker, IT, and a delivery person to bypass security controls. Once inside, I was able to access confidential files, plant simulated malicious software, and I have even gained access to a cash cage at a prominent Las Vegas property. It's crucial to understand that social engineering doesn't rely on hacking into systems or using advanced technology; it hinges on exploiting the most vulnerable element in the chain - the human element. As human beings it’s hard for us to challenge other people, especially when they look trustworthy and look as if they belong.
Attackers and security companies can utilize a practice we call Open-Source Intelligence Gathering. Essentially, it is the process of collecting and analyzing information from publicly available sources to assist in intelligence operations. OSINT activities tap into a range of public data sources - including social media, public government data, newspapers, digital maps, and the dark web among others. This information, when systematically collected and appropriately analyzed, can provide crucial insights into potential vulnerabilities, threat landscapes, and the tactics, techniques, and procedures (TTPs) of potential attackers.
Take the below as an example of OSINT that I have conducted in the past against a gaming organization successfully:
Social engineering attacks will usually pivot to credential stealing, financial fraud, ransomware, and most of the common problems we are all familiar with.
By being aware of these tactics, employees can become the first line of defense in an organization's security strategy. But education not only comes in slides and presentations but must be put to the test. Think of it as a vaccination. The more you put your employees to the test the stronger they become. Without constant practice we can become complacent with everyday affairs and too relaxed. I have seen that most organizations fail the first time and as an ethnical hacker and cybercrime defender, I do make it a point to educate them - to ask them to treat it as a learning experience. To succeed, one must set steps in place for how to remediate and correct it in the event it happens in the future. That’s why it’s critical to be proactive, to do the proper planning, and to be educated.
This is not an unknown topic in the gaming industry but happens more often than most realize. Due to most gaming casinos not being a publicly traded company on the exchange they do not have to report it. In the case of publicly traded organizations, they are not usually required to report it by the SEC unless material events are those that could affect a reasonable investor's decision to buy, hold, or sell a company's securities.
Let’s dive into an example that I’ve experienced many times during my investigations in the past with slot machines and table games. The usual suspects with the cases that I have been involved in over the years are most often the techs. From anywhere between an unknown amount to the sum of over 5 million dollars. But consider that they are not the only point of risk, and I am using them as this one example as this risk extends to all departments from accounting to casino management. Even patrons have exploited gaming in the hundreds of thousands of dollars.
Such as in the corporate world the formula is the same. Motive, access, and ease. Motive is usually financial. Access is how much access one has to financials and finally how easy is to get away with.
My past investigations have revealed everything from the discovery of foreign devices found attached to networks and gaming equipment, tricks used such a fishing line attached to 100-dollar bills (while having internal access to the machine), manipulation of wires and electrical systems inside machines, and even back end financial database manipulation.
Advancements in technology have brought about remarkable changes, among which are the miniaturization of computers and the extensive accessibility to public information. Computers have evolved from bulky machines to sleek, pocket-friendly devices with immense computational capabilities. This transition has not only made computing widely available to the masses but has also opened the risk of misuse.
Simultaneously, data and its easy availability on the internet has created an information age where almost anyone can access a wealth of knowledge with just a few clicks. With the introduction of a mass amount of AI tools, the gathering of intelligence has increased tenfold. While this has undeniably spurred innovation and collaboration on an unprecedented scale, it has also presented malevolent actors with a new landscape for exploitation.
Combining this and knowledge of internal processes of gaming, data access, and how the machines work eventually leads to discovered holes in the system. Sometimes even by accident.
Several effective strategies exist for combating fraud, particularly within the gaming industry. Regular audits of financials, processes, and personnel are critical to maintaining security. Financial audits should encompass a detailed comparison of current metrics with historical game data and vendor-supplied statistics, providing a comprehensive analysis of your financial hold from the floor or online gaming.
Although pre-employment background checks are a standard procedure, one should not overlook the possibility of a first-time offense. Therefore, consistent background checks, including financial checks where permissible, should be integral to your operation's security procedures.
Implementing a robust Governance, Risk Management, and Compliance (GRC) policy is also crucial. Such a policy minimizes potential risks by regulating machine and data access, among other factors.
Lastly, consider engaging third-party auditors to validate your security measures. An external audit not only verifies your internal control efficacy but provides an unbiased perspective on adherence to your established processes. This multi-pronged approach can significantly enhance your ability to combat potential fraud.
Today’s digital landscape has changed how the gaming industry operates, introducing new platforms, devices, and even business models. With the rise of online gaming and the exponential popularity of smartphones, gaming organizations need to adapt, pivoting with consumer behaviors. But this technological shift has also opened the door to more cybercrime than ever.
Many key players in the industry aren’t fully aware of how cyber threats have grown, both in severity and frequency. They may have IT staff in place to respond to threats, but no way of knowing if their defenses are really able to handle new challenges.
Learn how to strengthen your defenses against modern cybercriminals with this eBook.
We're here to help solve your complex IT and security problems.
Get in touch by completing this form and we'll connect you with a Bulletproof expert.